Intelligence and Security Informatics (ISI) is an interdisciplinary field of research that focuses on the development, use, and evaluation of advanced information technologies, including methodologies, models and algorithms, systems, and tools, for local, national, and international security related applications. Over the past decade, the ISI research community has matured and delivered an impressive array of research results that are both technically innovative and practically relevant. The 2018 European ISI Conference is the nineth ISI conference to be organized by the European ISI community. The conference was first held in 2008, and has been organized annually since 2011.


The conference deadlines have been published:

  • Paper submission due: 1st of June, 2018 1st of July, 2018
  • Notification of acceptance: 5th of Sep, 2018
  • Camera ready paper due: 21st of Sep, 2018
  • Registration: 21st of Sep, 2018
  • Conference: 24-25th of Oct, 2018

Call for paperSubmit paper

Important Dates

Draft paper submission deadline:2018-07-01

Call for paper description

The European Intelligence and Security Informatics Conference - EISIC - is Europe's premier conference on intelligence and security informatics. EISIC 2018 will celebrate the 8th anniversary of this premier conference series.

EISIC is a multi-disciplinary conference where science and technology researchers and developers from areas such as engineering, computer science, psychology, human factors, criminology, crime science, law, privacy and ethics, join with law enforcement, security and defence analysts and investigators to advance our capabilities for fighting crime and ensuring the safety and security of our citizens.

EISIC 2018 will showcase the latest technologies to tackle such crimes as human trafficking, terrorism, online radicalisation, child sexual exploitation, money laundering, and the use of forged documents. Further, we will discuss why such crimes are becoming more difficult to address, and how criminal elements are using such technologies such the dark net and blockchain to perpetrate their crimes and cover their tracks. Such technologies present a significant challenges to law enforcement as crimes and their consequences span both the virtual and physical worlds. EISIC 2018 will report on and share potential solutions to these problems.

Topics of submission

EISIC 2018 is interested in, but not limited to, the following topics:

  1. The Crime Phenomenon and Problems such as:
    • Cybercrime
    • Human trafficking
    • Child sex exploitation and abuse
    • Online child sexual coercion and extortion
    • Online radicalisation
    • Trade in fake documents and illegal substances
    • Money laundering
    • Illicit firearms trafficking
    • Mobile organised crime and gangs
  2. Tools and Techniques for Analysing Crime Data
    • Web-based intelligence monitoring, mining, and analysis
    • Computer support for cybercrime investigations and digital forensics
    • Visualization techniques for intelligence analysis and investigation
    • Cybercrime detection and analysis
    • Identity verification of suspects (using faces, fingerprints, tattoos etc.)
    • Authorship profiling and identification
    • Privacy, security, and civil liberties issues
    • Detection and analysis of information operations and disinformation
    • Data analytics for darknet marketplaces
    • Social network analysis for intelligence analysis and investigations
  3. Infrastructure Protection and Emergency Response
    • Cyber-infrastructure design and protection
    • Intrusion detection
    • Bio-terrorism tracking, alerting and analysis
    • Transportation and communication infrastructure protection
    • Border/transportation safety
    • Emergency response and management
    • Disaster prevention, detection and management
  4. Terrorism Informatics
    • Terrorism related analytical methodologies and software tools
    • Terrorism knowledge portals and databases
    • Social network analysis (radicalization, recruitment, conducting operations)
    • Lone wolf terrorism
    • Countering terrorism
  5. Data Science for Computational Criminology
    • Models for forecasting crime and measuring impact
    • Models for crime pattern recognition
    • Comprehensible/transparent models for crime analysis
    • Data representation and fusion
    • Methods for gang, volume, and special crime analysis
    • Handling class-imbalance and biased samples for crime analysis
    • Applications of intelligent decision support within law enforcement
  6. Decision Making and Interaction
    • Visualisation and visual analytics systems
    • Interactive and computational decision support
    • Analytical reasoning systems
    • Resilience in intelligence analysis
    • investigative and analytic decision making
    • Legal, privacy and ethical factors in intelligence analysis
    • Privacy, security, and civil liberties issues
    • Decision making
    • Expertise and intuition
    • Situational awareness
  7. Internet of Things and Security
    • Resilience and security in IoT applications
    • Privacy and integrity aspects related to IoT
    • Detection, prevention, response and mitigation of cyber threats to IoT
    • Threat models and IoT
  8. Border Control
    • Human authentication
    • Risk assessment of travellers
    • Modelling of border control processes
    • Surveillance and situational awareness
    • Technology impact, acceptance, and integration
  9. Training the Next Generation Intelligence and Security Professional
    • New methods and techniques for intelligence and security training
    • Challenges and complexities in future crime fighting and impact on intelligence and security analysis


Leave a message


Contact information


Sponsored By

  • Blekinge Institute of Technology (BTH)

Supported By

  • FOI Swedish Defence Research Agency
    IEEE Computer Society
    KTH - Royal Institute of Technology Sweden